Biometrics Panacea or Albatross - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Biometrics Panacea or Albatross

Description:

FAR/FMR versus FRR/FNMR. Authentication versus Identification. 1-to-1 versus 1-to-many ... Chang, K., Bowyer, K.W., Sarkar, S., Victor, B., (2003), 'Comparison and ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 21
Provided by: dylanb7
Category:

less

Transcript and Presenter's Notes

Title: Biometrics Panacea or Albatross


1
Biometrics Panacea or Albatross?
  • Michael Breward

2
Definitions
  • Biometrics
  • FTE
  • FAR/FMR versus FRR/FNMR
  • Authentication versus Identification
  • 1-to-1 versus 1-to-many

3
Required Properties
  • Universality
  • Distinctiveness
  • Permanence
  • Collectibility
  • Performance
  • Acceptability
  • Circumvention

4
Physiological Biometrics
  • Fingerprints
  • Palm Prints
  • Hand Geometry
  • Face Recognition
  • Ear and Lip Motion Recognition
  • Iris Scanning
  • Retinal Scanning

5
Physiological Biometrics contd
  • DNA
  • Dental Analysis
  • Others
  • Body Odor
  • Skin Reflective Analysis
  • Nail Bed Analysis

6
Physiological Biometrics Chart
7
Behavioural Biometrics
  • Voice Recognition
  • Signature Recognition
  • Keystroke Scan
  • Body Shape and Gait Analysis

8
Behavioural Biometrics Chart
9
Future of Biometrics
  • Pre 9/11 lack of cost justification
  • Post 9/11 goes beyond cost/benefit analysis
  • Are we on the precipice of a dangerous slippery
    slope?
  • Opportunistic behaviour of governments
  • Privacy versus security
  • CCTV
  • Second generation CCTV

10
Fair Information Practices FTC 1998
  • Notice/Awareness
  • No data should be collected from individuals that
    they are not aware is being collected
  • Choice/Consent
  • Individuals should have a choice as to how their
    information is used and distributed

11
Fair Information Practices FTC 1998 contd
  • Access/Participation
  • Individuals should have the right to view any
    data files about them and the right to contest
    the completeness and accuracy of those files
  • Integrity/Security
  • Organizations in the business of data collection
    must take steps to ensure that the data are
    accurate and secure from unauthorized access

12
Fair Information Practices FTC 1998 contd
  • Enforcement/Redress
  • Individuals must have an avenue of redress for
    violations of the above principles, with an
    enforcement mechanism to ensure compliance

13
Basic Rules for the Use of Biometrics
  • Sectoral Boundaries
  • Applications of a supra-sectoral nature call for
    explicit public approval
  • Clear, Recognizable, and Permissible Objective
  • Proportionality
  • Voluntary versus involuntary
  • Anonymity versus personalization

14
Basic Rules for the Use of Biometrics contd
  • Susidiarity
  • Not having to take things higher up
  • Central databases versus chipcards
  • Precise Delineation of the Target Group
  • Target group defined in advance
  • Precise definition of the target group
    facilitates external monitoring
  • Security

15
Basic Rules for the Use of Biometrics contd
  • External Supervision
  • Independent third party oversight
  • Self- regulation
  • Legislation

16
Future of Biometrics
  • JUDICIOUS Use
  • Multi-modal
  • Competitive Advantage
  • Sustainable
  • SAL

17
Questions and Answers
  • Thanks

18
References
  • Chang, K., Bowyer, K.W., Sarkar, S., Victor, B.,
    (2003), Comparison and Combination of Ear and
    Face Images in Appearance-Based Biometrics, IEEE
    Transactions on Pattern Analysis and Machine
    Intelligence, Vol. 25 Iss. 9, pp. 1160-1165.
  • Connolly, C., (2006), Performance Testing of
    Commercial Biometric Systems, Sensor Review,
    Vol. 26 Iss. 1, pp. 33-37.
  • Deane, F., Barrelle, K., Henderson, R., Mahar,
    D., (1995), Perceived Acceptability of Biometric
    Security Systems, Computers and Security, Vol.
    14, pp. 225-231.
  • Du, Y.E., (2006), Review of Iris Recognition
    Cameras, Systems, and Their Applications, Sensor
    Review, Vol. 26 Iss. 1, pp. 66-69.
  • Foxman, E.R., Kilcoyne, P., (1993), Information
    Technology, Marketing Practice, and Consumer
    Privacy Ethical Issues, Journal of Public
    Policy and Marketing, Vol. 12, pp. 106-119.
  • FTC, (1998), Privacy Online A Report to
    Congress, Washington, DC Federal Trade
    Commission.

19
References
  • Grijpink, J. (2001), Privacy Law Biometrics
    and Privacy, Computer Law and Security Report,
    Vol.17 Iss. 3, pp.154-160.
  • Heracleous, L., Wirtz, J., (2006), Biometrics
    The Next Frontier in Service Excellence,
    Productivity, and Security in the Service
    Sector, Managing Service Quality, Vol. 16 Iss.
    1, pp. 12-22.
  • Jain, A.K., Ross, A., (2004), Multibiometric
    Systems, Communications of the ACM, Vol. 47 Iss.
    1, pp. 34-40.
  • Langenderfer, J., Linnhoff, S., (2005), The
    Emergence of Biometrics and Its Effect on
    Consumers, The Journal of Consumer Affairs, Vol.
    39 Iss. 2, pp. 314-338.
  • Nowak, G.J., Phelps, J., (1992), Understanding
    Privacy Concerns An Assessment of Consumers
    Information Related Knowledge and Beliefs,
    Journal of Direct Marketing, Vol. 6 (Autumn), pp.
    28-39.
  • Nunn, S., (1994), How Capitol Technologies
    Affect Municipal Service Outcomes The Case of
    Police Mobile Digital Terminals and Stolen
    Vehicle Recoveries, Journal of Police Analysis
    and Management, Vol. 13 Iss. 3, Summer, pp.
    539-559.

20
References
  • Riley Jr., R.A., Kleist, V.F., (2005), The
    Biometric Technologies Business Case A
    Systematic Approach, Information Management and
    Computer Security, Vol. 13 Iss. 2, pp. 89-105.
  • Surette, R., (2005), The Thinking Eye Pros and
    Cons of Second Generation CCTV Surveillance
    Systems, Policing An International Journal of
    Police Strategies and Management, Vol. 28 Iss. 1,
    pp. 152-173.
  • Zorkadis, V., Donos, P., (2004), On
    Biometrics-Based Authentication and
    Identification From a Privacy-Protection
    Perspective, Information Management and Computer
    Security, Vol.12 Iss. 1, pp. 125-137.
Write a Comment
User Comments (0)
About PowerShow.com